Vni soft
Author: s | 2025-04-25
vni-soft.com Location: Vietnam. View VNI Soft’s profile on LinkedIn, a professional community of 1 billion members. VNI: VNI fonts are available from VNI Soft. Check out their Download page for a set of free sample fonts. VPS: VPS fonts come from the Vietnamese Professionals Society. You can
VNI Comfortable Surgical Uniform Pant Soft Jacket Lady Filipina
Tunnel port is assigned to a VLAN ID that is dedicated to tunneling. Each customer is provided with a unique service provider VLAN ID that supports all the VLANs of the customer. Q-in-VNI in a BGP EVPN VXLAN Fabric Using the Q-in-VNI feature, a service provider can provide Layer 2 overlay services by mapping the S-VLAN to the Layer 2 VNI. This allows the service providers to address their business customers' Layer 2 connectivity requirements with BGP EVPN VXLAN between the campus sites or a data center. Enterprise customers can also deploy the Q-in-VNI feature within a single site by mapping the traffic from multiple Layer 2 segments into a specific S-VLAN with EVPN EVI enabled, and with the following criteria: The site is bounded by the number of L2VNI overlay segments that are supported by a specific Cisco Catalyst 9000 series switch. VLAN segments are symmetric across the fabric edges. Note When the Q-in-VNI Layer 2 overlay service with the S-VLAN mapped to an EVPN Instance (also known as MAC VRF) is deployed, the end host MAC routes (RT2) belonging to all the C-VLANs are maintained in a single bridge table corresponding to the S-VLAN. In a BGP EVPN VXLAN fabric with Layer 2 interfaces that have trunk port configuration (Figure), the ingress VTEP strips the IEEE 802.1Q tag and encapsulates a Layer 2 packet with a VXLAN header and forwards the packet to the destination. At the egress VTEP, the packet is decapsulated and L2VNI is mapped to the corresponding VLAN. If the egress port is a trunk port, the corresponding VLAN ID is populated in the IEEE 802.1Q header, and the packet is sent out of the fabric. Figure 1. EVPN VXLAN Fabric with Trunk Mode on the Access Port When Q-in-VNI is configured (example topology shown below), customer traffic from C-VLAN with a VLAN ID of 10 is forwarded to the EVPN VXLAN overlay network. The ingress VTEP port in the overlay network is configured as a Q-in-VNI port with a provider VLAN 101 and a unique Layer 2 VNI of 1001. When a packet enters the Q-in-VNI tunnel port on the edge device, it is encapsulated with an outer VXLAN header containing the VNI 1001 (the original inner header with a VLAN 10 is retained). At the Egress VTEP, the packet is forwarded to the correct Q-in-VNI port, based on the matching provider VLAN 101 Configuring EVPN VXLAN Layer 2 Overlay with Q-in-VNI IEEE 802.1Q over Layer 2 VNI (Q-in-VNI) over EVPN VXLAN network addresses the requirement of limited network Layer 2 extension and isolation by carrying the IEEE 802.1Q tag transparently within the VXLAN header. This enables a Network-to-Network Interface (NNI) Layer 2 trunk interface with one or more 802.1Q segmented network to transport over a single Layer 2 VNI across the BGP EVPN VXLAN fabric network. Q-in-VNI provides a greater number of virtual networks to be created, with the necessary flexibility and scalability for campus network environments and other situations where a large number of Layer 2 overlays are required in a BGP EVPN VXLAN fabric. Restrictions for EVPN VXLAN Layer 2 Overlay with Q-in-VNI Selective Q-in-VNI and Q-in-VNI with VLAN mapping are not supported in this release. The dot1q-tunnel switchport mode access VLAN ID (S-VLAN) must be unique and should not be assigned to trunk VLAN ID (C-VLAN). Layer 2 Protocol Tunneling (L2PT) is not supported on an 802.1Q tunnel port that is mapped for BGP EVPN Layer 2 fabric network extension. BGP EVPN Layer 3 IP Routing function is not supported on those VLANs that are mapped to 802.1Q tunnel port. Overlapping MAC entry between multiple C-VLANs under a single EVPN-mapped S-VLAN is not supported. Information About Q-in-VNI Enterprise campus, data centers, and service provider networks are often required to become a carrier network and provide transparent Layer 2 bridging between statically assigned physical Layer 2 trunk interfaces. Such networks have specific requirements for VLAN IDs and the number of VLANs to be supported. The VLAN ranges required by different customers in the same service provider network might overlap, and traffic of customers through the infrastructure might be mixed. Assigning a unique range of VLAN IDs to each customer would restrict the customer configurations and could easily exceed the VLAN limit (4094) specified by the IEEE 802.1Q standard. Using the Q-in-VNI feature, service providers can use a single VLAN (S-VLAN) to support customers who have multiple VLANs (C-VLAN). Each customer's VLAN IDs are preserved, and traffic from different customers is segregated within the service provider network, though they appear to be in the same VLAN. Deploying IEEE 802.1Q tunneling expands the VLAN space by using a VLAN-in-VLAN hierarchy and retagging the tagged packets. A port configured to support IEEE 802.1Q tunneling is called a tunnel port. When tunneling is configured, aDownload font VNI-VNI fonts-Font VNI thư ph p-Font thu phap-Font VNI
Forwarding table instances isolate Layer 3 domains and segments from each other creating a multi-tenant network, either locally within the router or across multiple routers.VRFs are supported in NSX by deploying tier-0 VRF gateways. A tier-0 VRF gateway must be linked to a parent tier-0 gateway and inherits some of the tier-0 settings, such as the HA mode, edge cluster, internal transit subnet, T0-T1 transit subnets, and BGP local ASN.Multiple tier-0 VRF gateways can be created under the same parent tier-0, allowing the separation of segments and tier-1 gateways into multiple isolated tenants. With tier-0 VRF gateways, tenants can use overlapping IP addresses without any interference or communication with each other.In the context of EVPN, each Layer 3 VRF is identified by a global unique Virtual Network Identifier (VNI). The VNI for each VRF must match in NSX Edge nodes and data center gateways.VXLAN Encapsulation and VNI VXLAN encapsulation as defined in RFC7348, is used between NSX tunnel endpoints (edge nodes for Inline mode and hypervisors for Route Server mode) and external routers in order to ensure data plane compatibility with other vendors. Inside the NSX domain, GENEVE encapsulation is still used.The VNI is a 24-bit identifier used to identify a particular virtual network segment. When EVPN is used to advertise IP prefixes reachability by using Route Type 5 and the encapsulation type as VXLAN then the VNI identifies the tenant VRF instance. As defined in RFC9135, this VNI is advertised in the BGP control plane along with the prefix routes as well as used in the data plane encapsulation to differentiate the traffic between VRFs. The VNI for each VRF must match in NSX Edge nodes and data center gateways.. vni-soft.com Location: Vietnam. View VNI Soft’s profile on LinkedIn, a professional community of 1 billion members.Cisco Visual Networking Index (VNI) and VNI Service Adoption
Configuring Port VLAN Mapping This chapter contains the following sections: About Translating Incoming VLANs Sometimes a VLAN translation is required or desired. One such use case is when a service provider has multiple customers connecting to the same physical switch using the same VLAN encapsulation, but they are not and should not be on the same Layer 2 segment. In such cases translating the incoming VLAN to a unique VLAN that is then mapped to a VNI is the right way to extending the segment. In the figure below two customers, Blue and Red are both connecting to the leaf using VLAN 10 as their encapsulation. Customers Blue and Red should not be on the same VNI. In this example VLAN 10 for Customer Blue (on interface E1/1) is mapped/translated to VLAN 100, and VLAN 10 for customer Red (on interface E1/2) is mapped to VLAN 200. In turn, VLAN 100 is mapped to VNI 10000 and VLAN 200 is mapped to VNI 20000. On the other leaf, this mapping is applied in reverse. Incoming VXLAN encapsulated traffic on VNI 10000 is mapped to VLAN 100 which in turn is mapped to VLAN 10 on Interface E1/1. VXLAN encapsulated traffic on VNI 20000 is mapped to VLAN 200 which in turn is mapped to VLAN 10 on Interface E1/2. Figure 1. Logical Traffic Flow You can configure VLAN translation between the ingress (incoming) VLAN and a local (translated) VLAN on a port. For the traffic arriving on the interface where VLAN translation is enabled, the incoming VLAN is mapped to a translated VLAN that is VXLAN enabled. On the underlay, this is mapped to a VNI, the inner dot1q is deleted, and switched over to the VXLAN network. On the egress switch, the VNI is mapped to a translated VLAN. On the outgoing interface, where VLAN translation is configured, the traffic is converted to the original VLAN and egressed out. Refer to the VLAN counters on the translated VLAN for the traffic counters and not on the ingress VLAN. Port VLAN (PV) mapping is an access side feature and is View Full Version : Chuyển từ Unicode sang VNI ko dùng softCó cách nào dùng MS Word hoặc các chuơng trình có sẵn trong WinXP để chuyển 1 file đánh bằng Unicode sang VNI ko? Đang cần trả lời gấp. Thanxsatthubongdem2325-11-2003, 03:28có đó bạn hiền, nếu bạn không thích phần mềm thì...... bạn mở tiếp một của xổ word khác và nhìn vào của xổ word mà bạn muốn đổi và viết lại từ đầu đến cuối theo Vni. còn nếu bạn muốn dùng phần mềm made in Việt nam thì liên hệ với mình. còn một cách khác nữa là bạn hãy đem toàn bộ nội dung đó vào một trang web. sau đó bạn mở trang web đó ra. quét chọn hết rồi đem vào word (chỉ có tác dụng vơi office 2002 và 2003) bạn nên nhớ chọn default font trong word là vni-times nha.Tool để convert font online, text only, sẽ mất hết format trong Word đó. 16:53>> Chuyển từ Unicode sang VNI ko dùng softTrả lời thẳng câu hỏi: không, bạn phải dùng software.turbopanel24-04-2009, 17:07Có, bạn vào đây này : xuống phía dưới, chọn Convert Tools > VNI to Unicode ConverterChúc bạn thành công !trungluc24-04-2009, 17:47 vào đây mà download phần mềm convert.vantrung87hvt01-07-2009, 11:50vào đây chuyển online những tài liệu dài mình hay chuyển qua lại từ Unicod qua VNI và ngược lại, chỉ có 3 thao tác, nếu thìch bạn liên hệ với mình qua mail: [email protected], còn viết ra đây mình làm biếng lắm. bye.ngoccong200127-07-2009, 08:28Nếu bạn dùng UniKey thì nó có sẵn tính năng chuyển đổi Font trong đó rồi. (Phần Công Cụ....) Nhím tắt là Ctrl+Shift+F6Còn chuyển trực tiếp thì hơi khó :D. Vì MS Work không "chuyên dùng cho Việt Nam" :D Thân chào Powered by vBulletin® Version 4.2.0 CopyrightConfigure the VNI - docs.manage.security.cisco.com
"11": # SVI Description name: VRF1_VLAN11 enabled: true # IP anycast gateway to be used in the SVI in every leaf. ip_address_virtual: 10.10.11.1/24 "12": name: VRF1_VLAN12 enabled: true ip_address_virtual: 10.10.12.1/24 VRF2: vrf_vni: 2 svis: "21": name: VRF2_VLAN21 enabled: true ip_address_virtual: 10.10.21.1/24 "22": name: VRF2_VLAN22 enabled: true ip_address_virtual: 10.10.22.1/24 l2vlans: # These are pure L2 vlans. They do not have a SVI defined in the l3leafs and they will be bridged inside the VXLAN fabric "3401": name: L2_VLAN3401 "3402": name: L2_VLAN3402You would then describe the scope for where these network services should exist in the inventory.yml file:NETWORK_SERVICES: children: DC1_L3_LEAVES: DC1_L2_LEAVES: DC2_L3_LEAVES: DC2_L2_LEAVES:This specifies all switches in the fabric will be able to serve the new tenant.For the sake of simplicity, let’s say you defined just one pair of leaf switches that would serve this tenant.After running the relevant playbook, their tenant-related configuration would end up looking like this:vlan 11 name VRF1_VLAN11!vlan 12 name VRF1_VLAN12!vlan 21 name VRF2_VLAN21!vlan 22 name VRF2_VLAN22! for brevity>!vlan 3401 name L2_VLAN3401!vlan 3402 name L2_VLAN3402! for brevity>!vrf instance VRF1!vrf instance VRF2! for brevity>!interface Vlan11 description VRF1_VLAN11 no shutdown vrf VRF1 ip address virtual 10.10.11.1/24!interface Vlan12 description VRF1_VLAN12 no shutdown vrf VRF1 ip address virtual 10.10.12.1/24!interface Vlan21 description VRF2_VLAN21 no shutdown vrf VRF2 ip address virtual 10.10.21.1/24!interface Vlan22 description VRF2_VLAN22 no shutdown vrf VRF2 ip address virtual 10.10.22.1/24! for brevity>!interface Vxlan1 description dc1-leaf1a_VTEP vxlan source-interface Loopback1 vxlan virtual-router encapsulation mac-address mlag-system-id vxlan udp-port 4789 vxlan vlan 11 vni 10011 vxlan vlan 12 vni 10012 vxlan vlan 21 vni 10021 vxlan vlan 22 vni 10022 vxlan vlan 3401 vni 13401 vxlan vlan 3402 vni 13402 vxlan vrf VRF1 vni 1 vxlan vrf VRF2 vni 2! for brevity>!ip routing vrf VRF1ip routing vrf VRF2! for brevity>!router bgp 65101 ! for brevity> ! vlan 11 rd 10.255.1.33:10011 route-target both 10011:10011 redistribute learned ! vlan 12 rd 10.255.1.33:10012 route-target both 10012:10012 redistribute learned ! vlan 21 rd 10.255.1.33:10021 route-target both 10021:10021 redistribute learned ! vlan 22 rd 10.255.1.33:10022 route-target both 10022:10022 redistribute learned ! vlan 3401 rd 10.255.1.33:13401 route-target both 13401:13401 redistribute learned ! vlan 3402 rd 10.255.1.33:13402 route-target both 13402:13402 redistribute learnedMapping a VNI to a VLAN
Address management must be considered carefully, because it may have an impact on how NSX-T handles broadcast, unknown unicast, and multicast traffic (known, collectively, as BUM traffic). NSX-T can handle BUM replication in two ways: ● Hierarchical two-tier (MTEP): Also known as MTEP. In NSX-T the tunnel endpoint table has entries for host-VNI connections. VNIs are like VLANs: in NSX-T, each logical switch or segment has a VNI associated with it. If host-1 has three logical switches, A, B, and C with VNIs 5000, 5001, and 5002, respectively. The tunnel endpoint table will have host-1 added to VNI 5000, 5001, and 5002 as entries. Similarly, the tunnel endpoint table will have entries for all the hosts. If host-1 needs to send a BUM frame on VNI 5000, it refers the tunnel endpoint table to find other hosts with the VNI 5000 on it. This way host-1 knows the TEP endpoints of the other hosts with VNI 5000. After identifying the TEP endpoints host-1 handles the BUM traffic in the following manner: ◦ TEP IPs in the same subnet: For each of the hosts with TEP IPs in the same subnet as host-1, host-1 creates a separate copy of every BUM frame and sends the copy directly to the hosts. ◦ TEP IPs in different subnets: For hosts with TEP IPs in different subnets, for each subnet there may be one or more hosts. For all the destination hosts in each subnet, host-1 nominates one of these destination hosts to be a replicator, and creates a copy of every BUM frame and sends them to the replicator with the frame flagged as a replicate locally in the encapsulation header. Host-1 does not send copies to the other hosts in the same subnet. It becomes the responsibility of the replicator to create a copy of the BUM frame for every host with TEP in the same subnet and as the VNI associated to it in the tunnel endpoint table. ● Head (source): Also known as headend replication or source replication, host-1 simply creates a copy of each BUM frame for each and every host containing the same VNI (VNI 5000), regardless of TEP being in the same subnet or in different subnets. If all host TEPs are in the same subnets, then the choice of replication does not matter, as both modes send copies of every BUM frame to every other host containing the destination VNI. If the host TEPs are in different subnets, then hierarchical two-tier replication helps distribute the load among multiple hosts. Hierarchical two-tier is the default option of BUM traffic replication. However, the user has an option to select the BUM replication model to use while deploying an overlay logical switch. NSX-T transport zones As part of the NSX-T GENEVE configuration, the administrator must also define a transport zone to which ESXi clusters are mapped. A transport zone defines the scope of GENEVE logical switches in Manager mode (while in policy mode, these are referred to as “segments”). vni-soft.com Location: Vietnam. View VNI Soft’s profile on LinkedIn, a professional community of 1 billion members.Download VNI - Download.com.vn
That is derived from Layer 2 VNI. At the outbound tunnel port, the packet is transmitted with the original C-VLAN tag. Figure 2. Q-in-VNI over Layer 2 BGP EVPN VXLAN on 802.1Q Tunnel Mode port How to Configure Q-in-VNI in a BGP EVPN VXLAN Fabric Configure the access interface for Q-in-VNI tunneling. Before you begin Ensure that the Layer 2 overlay is configured as described in the Configuring Layer 2 Overlay Network chapter for the S-VLAN. Procedure Command or Action Purpose Step 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 interface interface-name Example: Device(config)# interface GigabitEthernet1/0/24 Enters interface configuration mode for the interface to be configured as a tunnel port. This should be the edge port on the VTEP that connects to the interface of the Layer 2 device with a trunk port configuration. Step 4 switchport access vlan vlan-id Example: Device(config-if)# switchport access vlan 101 Specifies the S-VLAN that is mapped to the L2VNI. Step 5 switchport mode dot1q-tunnel Example: Device(config-if)# switchport mode dot1q-tunnel Sets the interface as an IEEE 802.1Q tunnel port. Step 6 end Example: Device(config-if)# end Returns to privileged EXEC mode. Example: Configuring Q-in-VNI in a BGP EVPN VXLAN Fabric Note Before you enable Q-in-VNI on the interface, ensure that the EVPN VXLAN Layer 2 overlay network is configured. For an example configuration of an EVPN VXLAN Layer 2 overlay, refer to the "Configuring EVPN VXLAN Layer 2 Overlay Network" chapter. The following example shows how to configure an interface as a tunnel port to the enable Q-in-VNI feature in an EVPN VXLAN Layer 2 overlay network. In this configuration, the VLAN ID for the customer connected to Gigabit Ethernet interface 24 on stack member 1 is VLAN 101. l2vpn evpn instance 101 vlan-based encapsulation vxlan replication-type static!vlan configuration 101Comments
Tunnel port is assigned to a VLAN ID that is dedicated to tunneling. Each customer is provided with a unique service provider VLAN ID that supports all the VLANs of the customer. Q-in-VNI in a BGP EVPN VXLAN Fabric Using the Q-in-VNI feature, a service provider can provide Layer 2 overlay services by mapping the S-VLAN to the Layer 2 VNI. This allows the service providers to address their business customers' Layer 2 connectivity requirements with BGP EVPN VXLAN between the campus sites or a data center. Enterprise customers can also deploy the Q-in-VNI feature within a single site by mapping the traffic from multiple Layer 2 segments into a specific S-VLAN with EVPN EVI enabled, and with the following criteria: The site is bounded by the number of L2VNI overlay segments that are supported by a specific Cisco Catalyst 9000 series switch. VLAN segments are symmetric across the fabric edges. Note When the Q-in-VNI Layer 2 overlay service with the S-VLAN mapped to an EVPN Instance (also known as MAC VRF) is deployed, the end host MAC routes (RT2) belonging to all the C-VLANs are maintained in a single bridge table corresponding to the S-VLAN. In a BGP EVPN VXLAN fabric with Layer 2 interfaces that have trunk port configuration (Figure), the ingress VTEP strips the IEEE 802.1Q tag and encapsulates a Layer 2 packet with a VXLAN header and forwards the packet to the destination. At the egress VTEP, the packet is decapsulated and L2VNI is mapped to the corresponding VLAN. If the egress port is a trunk port, the corresponding VLAN ID is populated in the IEEE 802.1Q header, and the packet is sent out of the fabric. Figure 1. EVPN VXLAN Fabric with Trunk Mode on the Access Port When Q-in-VNI is configured (example topology shown below), customer traffic from C-VLAN with a VLAN ID of 10 is forwarded to the EVPN VXLAN overlay network. The ingress VTEP port in the overlay network is configured as a Q-in-VNI port with a provider VLAN 101 and a unique Layer 2 VNI of 1001. When a packet enters the Q-in-VNI tunnel port on the edge device, it is encapsulated with an outer VXLAN header containing the VNI 1001 (the original inner header with a VLAN 10 is retained). At the Egress VTEP, the packet is forwarded to the correct Q-in-VNI port, based on the matching provider VLAN 101
2025-04-18Configuring EVPN VXLAN Layer 2 Overlay with Q-in-VNI IEEE 802.1Q over Layer 2 VNI (Q-in-VNI) over EVPN VXLAN network addresses the requirement of limited network Layer 2 extension and isolation by carrying the IEEE 802.1Q tag transparently within the VXLAN header. This enables a Network-to-Network Interface (NNI) Layer 2 trunk interface with one or more 802.1Q segmented network to transport over a single Layer 2 VNI across the BGP EVPN VXLAN fabric network. Q-in-VNI provides a greater number of virtual networks to be created, with the necessary flexibility and scalability for campus network environments and other situations where a large number of Layer 2 overlays are required in a BGP EVPN VXLAN fabric. Restrictions for EVPN VXLAN Layer 2 Overlay with Q-in-VNI Selective Q-in-VNI and Q-in-VNI with VLAN mapping are not supported in this release. The dot1q-tunnel switchport mode access VLAN ID (S-VLAN) must be unique and should not be assigned to trunk VLAN ID (C-VLAN). Layer 2 Protocol Tunneling (L2PT) is not supported on an 802.1Q tunnel port that is mapped for BGP EVPN Layer 2 fabric network extension. BGP EVPN Layer 3 IP Routing function is not supported on those VLANs that are mapped to 802.1Q tunnel port. Overlapping MAC entry between multiple C-VLANs under a single EVPN-mapped S-VLAN is not supported. Information About Q-in-VNI Enterprise campus, data centers, and service provider networks are often required to become a carrier network and provide transparent Layer 2 bridging between statically assigned physical Layer 2 trunk interfaces. Such networks have specific requirements for VLAN IDs and the number of VLANs to be supported. The VLAN ranges required by different customers in the same service provider network might overlap, and traffic of customers through the infrastructure might be mixed. Assigning a unique range of VLAN IDs to each customer would restrict the customer configurations and could easily exceed the VLAN limit (4094) specified by the IEEE 802.1Q standard. Using the Q-in-VNI feature, service providers can use a single VLAN (S-VLAN) to support customers who have multiple VLANs (C-VLAN). Each customer's VLAN IDs are preserved, and traffic from different customers is segregated within the service provider network, though they appear to be in the same VLAN. Deploying IEEE 802.1Q tunneling expands the VLAN space by using a VLAN-in-VLAN hierarchy and retagging the tagged packets. A port configured to support IEEE 802.1Q tunneling is called a tunnel port. When tunneling is configured, a
2025-04-04Forwarding table instances isolate Layer 3 domains and segments from each other creating a multi-tenant network, either locally within the router or across multiple routers.VRFs are supported in NSX by deploying tier-0 VRF gateways. A tier-0 VRF gateway must be linked to a parent tier-0 gateway and inherits some of the tier-0 settings, such as the HA mode, edge cluster, internal transit subnet, T0-T1 transit subnets, and BGP local ASN.Multiple tier-0 VRF gateways can be created under the same parent tier-0, allowing the separation of segments and tier-1 gateways into multiple isolated tenants. With tier-0 VRF gateways, tenants can use overlapping IP addresses without any interference or communication with each other.In the context of EVPN, each Layer 3 VRF is identified by a global unique Virtual Network Identifier (VNI). The VNI for each VRF must match in NSX Edge nodes and data center gateways.VXLAN Encapsulation and VNI VXLAN encapsulation as defined in RFC7348, is used between NSX tunnel endpoints (edge nodes for Inline mode and hypervisors for Route Server mode) and external routers in order to ensure data plane compatibility with other vendors. Inside the NSX domain, GENEVE encapsulation is still used.The VNI is a 24-bit identifier used to identify a particular virtual network segment. When EVPN is used to advertise IP prefixes reachability by using Route Type 5 and the encapsulation type as VXLAN then the VNI identifies the tenant VRF instance. As defined in RFC9135, this VNI is advertised in the BGP control plane along with the prefix routes as well as used in the data plane encapsulation to differentiate the traffic between VRFs. The VNI for each VRF must match in NSX Edge nodes and data center gateways.
2025-04-21Configuring Port VLAN Mapping This chapter contains the following sections: About Translating Incoming VLANs Sometimes a VLAN translation is required or desired. One such use case is when a service provider has multiple customers connecting to the same physical switch using the same VLAN encapsulation, but they are not and should not be on the same Layer 2 segment. In such cases translating the incoming VLAN to a unique VLAN that is then mapped to a VNI is the right way to extending the segment. In the figure below two customers, Blue and Red are both connecting to the leaf using VLAN 10 as their encapsulation. Customers Blue and Red should not be on the same VNI. In this example VLAN 10 for Customer Blue (on interface E1/1) is mapped/translated to VLAN 100, and VLAN 10 for customer Red (on interface E1/2) is mapped to VLAN 200. In turn, VLAN 100 is mapped to VNI 10000 and VLAN 200 is mapped to VNI 20000. On the other leaf, this mapping is applied in reverse. Incoming VXLAN encapsulated traffic on VNI 10000 is mapped to VLAN 100 which in turn is mapped to VLAN 10 on Interface E1/1. VXLAN encapsulated traffic on VNI 20000 is mapped to VLAN 200 which in turn is mapped to VLAN 10 on Interface E1/2. Figure 1. Logical Traffic Flow You can configure VLAN translation between the ingress (incoming) VLAN and a local (translated) VLAN on a port. For the traffic arriving on the interface where VLAN translation is enabled, the incoming VLAN is mapped to a translated VLAN that is VXLAN enabled. On the underlay, this is mapped to a VNI, the inner dot1q is deleted, and switched over to the VXLAN network. On the egress switch, the VNI is mapped to a translated VLAN. On the outgoing interface, where VLAN translation is configured, the traffic is converted to the original VLAN and egressed out. Refer to the VLAN counters on the translated VLAN for the traffic counters and not on the ingress VLAN. Port VLAN (PV) mapping is an access side feature and is
2025-03-31